Bridging Compliance: Where SOC 2 and C5 Overlap and How to Leverage Both
Cybersecurity Assessments | Cloud Computing | SOC Examinations | SOC 2
Published: Apr 29, 2025
As cloud services continue to expand globally, service providers are increasingly expected to demonstrate compliance with a variety of frameworks depending on where their customers operate. Two commonly requested assurance reports include the American Institute of Certified Public Accountants (AICPA) SOC 2 attestation report and the German Federal Office for Information Security (Bundesmat fur Sicherheit in der Informationstechnik, or “BSI”) Cloud Computing Compliance Criteria Catalogue (C5) attestation report.
As organizations expand their cloud operations and customer bases, the growing need to address and navigate both frameworks is becoming more prevalent. Fortunately, SOC 2 and C5 share many common elements, and a streamlined approach can reduce redundancy, effort, and cost. In this article, we’ll explore how these two standards overlap with each other and the benefits of pursuing both, as well as provide practical guidance for approaching the frameworks efficiently.
What is a SOC 2 Report?
A SOC 2 report is an attestation report created by AICPA to evaluate the effectiveness of internal controls relevant to data security. It is most commonly pursued by service organizations who want to demonstrate their commitment to protecting the sensitive customer data they handle throughout their business operations.
SOC 2 reports are based on the Trust Services Criteria (TSC), which include:
- Security (required)
- Availability
- Processing Integrity
- Confidentiality
- Privacy
Service organizations can select which of these categories to include in their report based on their service commitments and customer expectations.
There are two types of SOC 2 reports offered:
- Type 1 assesses the design of controls at a point in time.
- Type 2 evaluates the operating effectiveness of those controls over a defined period (typically 6–12 months).
The process includes a readiness assessment (which is optional), evidence collection, control testing by an independent CPA firm, and formal reporting.
Organizations who benefit from a SOC 2 report are those which store, process, or transmit customer data, which includes cloud providers, managed service providers, fintech companies, health tech platforms, and more. A SOC 2 report is often required during vendor due diligence and can be a differentiator in competitive markets.
What is a C5 Report?
The C5 is a framework developed by the BSI in Germany. It is specifically designed for cloud service providers (CSPs) and focuses on cloud-specific security requirements aligned with German and EU regulatory expectations.
C5 is a control framework which organizations can be audited against. It includes 17 categories with more than 100 controls spanning the following key areas:
- Organization of information security
- Physical and environmental security
- Operational and technical measures
- Incident and risk management
- Compliance with legal and regulatory requirements
C5 comes in two types:
- Type 1 assesses the design of controls at a point in time.
- Type 2 evaluates the operating effectiveness of those controls over a defined period. Beginning in July 2025, CSP’s are required to have a Type 2 assessment, and a Type 1 assessment will no longer be sufficient.
Audits are typically performed by an accredited independent third party, such as a CPA or IT audit firm, and result in a report that outlines the implementation and effectiveness of the C5 controls. Organizations who pursue a C5 report generally serve customers in the EU and need to demonstrate alignment with local expectations around data sovereignty, transparency, and security.
SOC 2 and C5 Reports: Key Areas of Overlap
Although SOC 2 and C5 originate from different governing bodies and geographic regions, they target many of the same core risks and control areas. Key areas of alignment include:
- Access Control: Both require strict access management, including authentication, authorization, and regular access reviews.
- Security Monitoring and Logging: Both emphasize the need for continuous monitoring, log collection, and analysis to detect and respond to incidents.
- Risk Management: Both call for formal risk assessments and risk mitigation processes.
- Incident Response: Both call for documented incident response plans and incident management procedures.
- System Change Management: Both require controls around system development, updates, and configuration changes.
While the language and structure may differ slightly, the intent behind many of the controls is the same.
Why Pursue Both SOC 2 and C5 Reports?
Organizations who are already established or are expanding into both U.S. and European markets find that having both a SOC 2 and C5 report helps them better meet customer expectations and helps reduce friction in the sales and procurement process. These frameworks share many common goals including protecting customer data, demonstrating internal control maturity, and supporting regulatory compliance. Together, they form a complementary assurance package that shows your organization is committed to data protection on a global scale.
Key benefits of pursing both reports include:
- Marketability Across Regions: Holding both reports removes barriers during vendor onboarding and RFP processes.
- Increased Customer Trust and Confidence: Prospects and existing clients gain assurance that your organization is independently verified to be operating securely and responsibly across borders.
- Enhanced Competitive Edge: Demonstrating compliance with two respected frameworks positions your organization as a leader in security and transparency, helping you stand out in crowded markets.
- Audit Synergy: Many SOC 2 and C5 control requirements overlap. When planned strategically, these assessments can be coordinated to reduce redundancy, saving time and internal resources.
- Security: Undergoing both assessments demonstrates an organization’s commitment to security and helps to establish a mature internal control environment.
Pursuing both a SOC 2 and C5 attestation report strengthens your overall security standing and allows your organization to demonstrate its commitment to high security and compliance standards. This gives you an undeniable competitive advantage across international markets. In addition to the numerous benefits of pursuing both reports, there are advantages to consolidating compliance efforts by taking measures to leverage both frameworks efficiently throughout the attestation process.
Leveraging Both Frameworks Efficiently
Given the many areas of overlap between SOC 2 and C5 attestation reports, there are ample opportunities to consolidate compliance initiatives. To streamline both SOC 2 and C5 without duplicating efforts, organizations can:
- Map Controls Across Frameworks: Create a unified control matrix that aligns each control activity to both the SOC 2 TSC and the C5 requirements.
- Map Evidence Across Frameworks: After identifying the controls that map across frameworks, map what requests can be used to satisfy the requirement for each audit.
- Use a Single Assessor: Engaging with a firm that can perform both assessments can reduce time and effort through shared walkthroughs, testing, and reporting.
- Plan Assessments Together: Align audit timelines so evidence can be reused, and team resources can be managed efficiently.
By leveraging both frameworks efficiently and consolidating compliance efforts, organizations can save valuable time and resources without disrupting daily operations.
The Road Ahead in Your SOC 2 and C5 Compliance Journey
As organizations continue to expand globally and operate in multiple jurisdictions, the ability to efficiently comply with multiple frameworks like SOC 2 and C5 will be of paramount importance. These two frameworks, while different in their structure and regional focus, share a strong foundation in risk and security management.
By understanding how they overlap and planning strategically, organizations can reduce audit fatigue, streamline compliance, and build greater trust with customers worldwide. If you’re ready to begin your SOC 2 Compliance Examination or C5 Attestation journey or have any additional questions about the requirements or process, Schellman can help. Contact us today and we’ll get back to you shortly.
In the meantime, discover other helpful SOC 2 and C5 insights in these additional resources:
About Nate Kocan
Nate Kocan is a Manager within SOC Services practice of Schellman, based in Columbus, OH. Prior to joining Schellman, Nate specialized in SOC 1 audits and IT audits supporting financial statement audits. As a Manager with Schellman, Nate Kocan has over six years of experience compromised of serving clients in various industries, including cloud computing and data centers, financial services and fintech, and healthcare. Nate is focused primarily on SOC, HIPAA, and various attestation audits for organizations across various industries.